Next Article in Journal
Utilization of Industrial Ferronickel Slags as Recycled Concrete Aggregates
Previous Article in Journal
Applicability Study on Modified Argillaceous Slate as Subgrade Filling for High-Speed Railway
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Resource Allocation and Trajectory Planning of UAV-Aided Mobile Edge Computing in Post-Disaster Areas

1
School of Automation, Guangdong University of Technology, Guangzhou 510006, China
2
Guangdong Key Laboratory of IoT Information Technology, Guangzhou 510006, China
3
Key Laboratory of Intelligent Detection and Internet of Manufacturing Things, Ministry of Education, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(4), 2226; https://doi.org/10.3390/app12042226
Submission received: 24 January 2022 / Revised: 14 February 2022 / Accepted: 15 February 2022 / Published: 21 February 2022

Abstract

:
When natural disasters strike, users in the disaster area may be isolated and unable to transmit disaster information to the outside due to the damage of communication facilities. Unmanned aerial vehicles can be exploited as mobile edge servers to provide emergency service for ground users due to its mobility and flexibility. In this paper, a robust UAV-aided wireless-powered mobile edge computing (MEC) system in post disaster areas is proposed, where the UAV provides charging and computing service for users in the disaster area. Considering the estimation error of users’ locations, our target is to maximize the energy acquisition of each user by jointly optimizing the computing offloading process and the UAV trajectory. Due to the strongly coupled connectionbetween optimization variables and the non-convex nature for trajectory optimization, the problem is difficult to solve. Furthermore, the semi-infinity of the users’ possible location makes the problem even more intractable. To tackle these difficulties, we ignore the estimation error of users’ location firstly, and propose an iterative algorithm by using Lagrange dual method and successive convex approximation (SCA) technology. Then, we propose a cutting-set method to deal with the uncertainty of users’ location. In this method, we degrade the influence of location uncertainty by alternating between optimization step and pessimization step. Finally, simulation results show that the proposed robust algorithm can effectively improve the user energy acquisition.

1. Introduction

Natural disasters, such as earthquake, flood, and typhoon, often cause huge and unpredictable losses to human lives and properties [1,2,3]. Most of these disasters will result in unavailability of, or severe damage to, traditional terrestrial wireless infrastructures, as well as disruption to regional communication, which brings challenges to post-disaster response and relief [4,5,6]. By virtue of the advantages of dynamic mobility, flexibility, and on-demand deployment, unmanned aerial vehicles (UAVs) have been deemed as a promising technique in post-disaster area communication recovery [7,8,9]. In particular, the existence of line-of-sight (LoS) links between UAV and ground users has aroused a fast-growing interest in utilizing UAVs as aerial wireless platforms [10,11,12,13], while the limited power supply in disaster areas restricts the users’ survival time and equipment performance, which also puts forward higher requirements for UAV-aided post-disaster services.
To tackle the above mentioned challenge, the combination of mobile edge computing (MEC) and wireless power transfer (WPT) seems to be an effective approach [14,15,16]. On one hand, by offloading computation tasks to UAVs, users can significantly improve their data processing capabilities [17,18,19,20]. On the other hand, with the aid of WPT technology, users can harvest radio-frequency (RF) signals from UAVs to prolong their survival time [21,22,23]. Unfortunately, the severe propagation loss of the wireless signals over long distances will degrade the performance of wireless information transfer (WIT) and WPT [24,25,26]. To improve the efficiency of WIT and WPT, UAVs should know the exact location of users in advance. However, in post-disaster areas, the exact location of users is difficult to obtain. The incomplete location information profoundly affects the trajectory planning of UAV and reduces the energy acquisition efficiency of users and the service quality of UAV [27,28,29,30]. Therefore, the robust design of trajectory and resource allocation of UAVs in post-disaster areas is of paramount importance.
Motivated by the requirements of a UAV-enabled wireless platform in a post-disaster area, we consider a robust UAV-enabled wireless-powered MEC system in this paper. In this system, a UAV equipped with MEC device and RF transmitter flies to the post-disaster area to provide computing and charging services for ground users. In this paper, we assume that terrestrial communications were destroyed in the disaster. Affected by this, the UAV only knows the rough areas where the users are, but the exact locations of the users are unknown. In order to ensure that users have enough power to maintain until the arrival of ground rescue, our target is to maximize the energy acquisition of each user while meeting the computation needs of users.
The considered problem is a non-convex semi-infinite optimization problem, which is intractable and hard to solve. In order to solve this intractability, we transform the original problem into a solvable form by ignoring the uncertainty of location first. Considering the coupling between computation offloading optimization and trajectory planning, an iterative optimization method is proposed by using Lagrange dual method and successive convex approximation (SCA) technology, respectively. Then, a cutting-set method is proposed to continuously decrease the impact of worst-case location of users on optimization. Due to the worst-case location of users changing with the optimization of UAV trajectory, the cutting-set method is achieved by alternating optimization, i.e., optimizing the UAV trajectory for given subsets of worst-case users’ locations in the optimization step, and updating the subsets of worst-case users’ locations according to UAV trajectory in the pessimization step.
To summarize, the difference between our work and those in [13,18] is mainly twofold. First, the proposed system considers the imperfect location information of users, which is more suitable for practical applications. Second, the proposed robust algorithm can effectively degrade the influence of location uncertainty on user energy acquisition. To our best knowledge, there are few studies that address the robust design for a UAV-enabled wireless-powered MEC system. In summary, the main contributions of this paper are as follows:
  • We propose a UAV-enabled wireless-powered MEC system in a post-disaster area, while the imperfect location of users is considered. To ensure users have enough power in the post-disaster area, UAV provides charging and computing services for users.
  • We propose a joint resource allocation and trajectory planning algorithm under known users’ location to solve the strong coupling between optimization variables.
  • We propose a robust cutting-set method to degrade the influence of worst-case location of users on optimization.
The rest of this paper is organized as follows. We describe the system model and formulate the optimization problem in Section 2. Then, we give a joint resource allocation and trajectory planning algorithm under known users’ location in Section. In Section 4, we propose a robust cutting-set method. After this, the numerical results are presented in Section 5. Finally, we draw conclusions of our work in Section 6.

2. System Model and Problem Formulation

In this work, we propose a UAV-enabled wireless-powered MEC system in a post-disaster area, as shown in Figure 1. The terrestrial wireless infrastructures were damaged in the disaster. In order to get the situation of the disaster area and prepare for further rescue, a UAV, which is equipped with an RF transmitter and an MEC device, provides charging and computing services for a set N { 1 , , N } of ground users, which has certain computation tasks R n to complete, trapped in the disaster area.
Without loss of generality, we adopt a three-dimensional Euclidean coordinate system to represent the locations, and measure all dimensions in meters. Affected by the destruction of terrestrial wireless infrastructures, the UAV only knows the approximate location of nth users, denoted by q n = ( x n , y n , 0 ) , with limited location information, while the exact location of nth users is q ¯ n = ( x ¯ n , y ¯ n , 0 ) , with a estimation error Δ q n . The relation between the exact and approximate location of nth users is given by
q ¯ n = q n + Δ q n , Δ q n Ω n { Δ q n ε n } ,
where Ω n is a continuous set of possible location estimation errors for the nth users, and  ε n denotes the radius of the uncertainly region Ω n .
We assume that the UAV takes off and lands at a safe location q s = ( x s , y s , 0 ) within finite flight duration T . The flight duration T is discretized into T sufficiently small time slots with equal length δ = T / T . Thus, the UAV can be seen as fixed in a certain position in each time slot, and its horizontal plane coordinate at tth slot is q u [ t ] = ( x t , y t ) . Similar to [29], we assume that the UAV flies at a constant altitude H to avoid the flight energy consumption caused by frequent ascend or descend. Correspondingly, the distance between UAV and user n is
d n [ t ] = H 2 + q u [ t ] q n 2 ,
where · denotes the Euclidean norm. Similar to [18], we assume the wireless channel between the UAV and users is LoS link. Then, the channel power gain between UAV and users is
g n [ t ] = β 0 d n [ t ] 2 ,
where β 0 is the channel power gain at d 0 = 1 m.
In downlink WPT mode, we consider that the UAV uses constant transmission power P u for wireless power transmission. The energy harvested by nth user is given as
E h [ t ] = η g n [ t ] P u δ ,
where 0 < η 1 denotes the energy conversion efficiency of each user, while in uplink WIT mode, for given offloading power P o , n [ t ] , the offloading rate r t r , n [ t ] of nth user in the tth slot is given as
r t r , n [ t ] = B l o g 2 ( 1 + P o , n [ t ] g n [ t ] σ 2 ) ,
where B is the communication bandwidth, and  σ 2 is the variance of additive white Gaussian noise with zero mean.
To utilize the energy in an efficient way, we assume that both UAV and users can adaptively adjust the CPU frequency [29]. The computation task amounts R c , n and the computation energy consumption E c , n of nth user in the tth slot are given as
R c , n = f n [ t ] δ C n , E c , n = θ n f n [ t ] 3 δ ,
where f n [ t ] represents the CPU frequency of users, C n denotes the number of CPU cycles to complete the computation, and θ n is the effective capacitance coefficient of the CPU. The expressions of computation amounts R c , u and computation energy consumption E c , u of UAV are consistent with users, which are not listed here.
For given UAV trajectory, we can obtain the flight speed of UAV on the horizontal plane:
v u ( t ) = q u , t + 1 q u , t δ .
For safety consideration, the maximum flight speed of UAV is v m a x . In order to focus on designing the robust algorithm of trajectory planning and computation offloading optimization, we adopt a simplified flight energy consumption model in this work, while many factors will affect the flight energy consumption of UAV in reality. The flight energy consumption of UAV can be expressed as
E f l y [ t ] = 0.5 m u δ v u [ t ] 2 ,
where m u is the mass of UAV.
Considering the inconvenience of obtaining energy in post-disaster areas, it is necessary for users to obtain charging and computing services from UAVs as much as possible to ensure that users gain more energy. The energy gain of the nth user is given as
E g a i n , n = t = 1 T ( η g n [ t ] P u θ n f n [ t ] 3 ) t = 1 T 1 P o , n [ t ] .
In this work, our target is to maximize the minimum energy gain among users while guaranteeing the completion of computation task; the UAV trajectory and offloading optimization variables are jointly optimized under the estimation error of users’ location. Then, the optimization problem can be formulated as
P 1 : max Θ min n N max Δ q n Ω n E g a i n , n ,
s . t . C 1 : t = 1 T ( E f l y [ t ] + P u ) + t = 2 T θ u f u [ t ] 3 E b a t ,
C 2 : t = 1 T f n [ t ] C n + t = 1 T 1 r t r , n [ t ] R n , n N ,
C 3 : t = 2 T f u [ t ] C u n = 1 N t = 1 T 1 r t r , n [ t ] , t T ,
C 4 : f u [ t ] 0 , f n [ t ] 0 , n N ,
C 5 : q u [ 1 ] = q u [ T + 1 ] = q s ,
C 6 : v u [ t ] v m a x , t T .
where Θ = { q u [ t ] , f u [ t ] , f n [ t ] , P o , n [ t ] } is the optimal variable set, and T T represents the set T except the Tth time slot. C 1 is the UAV battery constraint; C 2 represents all computation tasks for each user need to be processed; C 3 denotes that all computation task from users should to be handled by UAV in time; C 4 are the CPU frequency constraints of user and UAV; C 5 indicates that the UAV takes off and lands at the same safe position; C 6 gives the maximum flight speed constraint of UAV.

3. Joint Resource Allocation and Trajectory Planning under Known Users’ Location

In this section, we propose a joint resource allocation and trajectory planning algorithm to solve problem P 1 under known users’ location. For the known users’ location, we can ignore the estimation error ε n of users, i.e., let q ^ n : = q n , n N . Then, the original optimization problem P 1 can be transformed to
P 2 : max Θ min n N E ^ g a i n , n ,
s . t . C 1 C 6 .
Due to the coupling among the optimization variables, P 2 is still difficult to solve. Thus, we divide the optimization problem into two parts, i.e., computation offloading optimization and trajectory planning, and optimize them alternately. Firstly, we optimize the computation offloading resources by Lagrangian duality method under given UAV trajectory. Then, the SCA method is adopted to optimize the UAV trajectory for given computation offloading resources.

3.1. Computation Offloading Optimization

For given UAV trajectory, we can obtain the computation offloading variables optimization problem P3:
P 3 : min P o , n , f u , f n t = 1 T θ n f n [ t ] 3 + t = 1 T 1 P o , n [ t ] , s . t . C 2 , C 4 .
Obviously, P 3 is a convex problem, which can be easily solved by Lagrange duality method. Then, we can obtain Theorem 1 by solving the Lagrangian function.
Theorem 1.
For given UAV trajectory q u ( t ) , the optimal offloading power and CPU frequencies of usern can be respectively expressed as
P o , n o p t [ t ] = λ B l n 2 σ 2 g n [ t ] + ,
f n o p t [ t ] = λ 3 θ n C n ,
where λ 0 denotes the dual variable associated with the constraint C2.
Proof. 
See the Appendix A.    □
Then, we adopt the subgradient method to obtain the value of dual variables.
λ ( i + 1 ) = [ λ ( i ) θ ( i ) Δ λ ( i ) ] + ,
where i represents the iteration index, θ ( i ) denotes the iterative step, and the corresponding subgradient Δ λ ( i ) can be obtained by
Δ λ ( i ) = t = 1 T f n i , o p t [ t ] C n + t = 1 T 1 B l o g 2 ( 1 + P o , n i , o p t [ t ] g n [ t ] σ 2 ) R n ,
where f n i , o p t [ n ] , P o , n i , o p t [ t ] represent the optimal solutions at the ith iteration.
Then, according to optimal offloading power P o , n i , o p t [ t ] and constraint C3, we can obtain the optimal CPU frequencies of UAV
f u i , o p t [ t ] = B δ n = 1 N l o g 2 ( 1 + P o , n i , o p t [ t ] g n [ t ] σ 2 ) ,
since the lowest computation energy consumption can be obtained only when the computation frequency is a constant.

3.2. UAV’s Trajectory Planning

For given computation offloading variables, the UAV’s trajectory optimization problem P4 can be expressed as
P 4 : max q u [ t ] min n N t = 1 T η g n [ t ] P u s . t . C 1 , C 2 , C 5 , C 6 .
Due to the objective function of P4 being non-concave and the constraint C2 being non-convex with respect to q u [ t ] , the problem P4 is non-convex. For this problem, we choose the SCA method to solve.
By adopting the SCA method, we can obtain
r t r , n [ t ] r t r , n l o w = B log 2 1 + P o , n [ t ] β 0 σ 2 ( H 2 + l n j [ t ] 2 ) P o , n [ t ] β 0 l o g 2 e ( l n [ t ] 2 l n j [ t ] 2 ) ( H 2 + l n j [ t ] 2 ) ( σ 2 H 2 + σ 2 l n j [ t ] 2 + P o , n [ t ] β 0 ) ,
where l n [ t ] = q u [ t ] q n , the  r k l o w is the lower bound of r n [ t ] , and the equality holds when l n [ t ] = l n j [ t ] .
Similarly, we can obtain the lower bound g n l o w of g n [ t ] :
g n [ t ] g n l o w = β 0 ( H 2 + 2 l n j [ t ] 2 l n [ t ] 2 ) ( H 2 + l n j [ t ] 2 ) 2 .
According to Formulas (19) and (20), we can transform the problem P4 to
P 4 . 1 : max q u [ t ] t = 1 N η g n l o w P u
s . t . C 2.1 : t = 1 T f n [ t ] C n + t = 1 T 1 r t r , n l o w R n , n N ,
C 1 , C 5 , C 6 .
In problem P4.1, we can find that the objective function and the constraint C2.1 are both convex with respect to q u [ t ] . Thus, the problem P4.1 is a convex problem. We can use CVX to solve this problem.

3.3. Alternative Algorithm for Solving P2

Based on the Lagranginan duality method and SCA method, we propose a joint resource allocation and trajectory planning (JRATP) algorithm under known users’ location in this subsection. The detailed JRATP algorithm is shown in Algorithm 1.
Algorithm 1 Joint Resource Allocation and Trajectory Planning Algorithm under known users’ location
Input: Initialize P o , n 1 [ t ] , f n 1 [ t ] , f u 1 [ t ] , q u 1 [ t ] with feasible solution.
Initialization: Set the radio environment parameters B, β 0 , σ 2 , the operation parameters P u , η , C n , C u , θ n , θ u , and the tolerance error ε 1 , ε 2
For each iteration i
    Calculate P o , n i , o p t [ t ] , f n i , o p t [ t ] by Theorem 1 and calculate f u i , o p t [ t ] according to (17);
    Update Δ μ ( i ) , and  μ ( i + 1 ) by subgradient formula;
    P o , n i + 1 [ t ] = P o , n i , o p t [ t ] , f n i + 1 [ t ] = f n i , o p t [ t ] , f u i + 1 [ t ] = f u i , o p t [ t ] , q u j [ t ] = q u i [ t ] .
For each iteration j
    Using CVX to solve P4.1 for given P o , n o p t , j [ t ] , f n o p t , j [ t ] , f u o p t , j [ t ] and obtain q u o p t , i [ t ] ;
    If  t = 1 N q u j + 1 [ t ] q u j [ t ] ε 2 , q u i [ t ] = q u j [ t ] , break
    End If
    update j = j + 1 ;
End For
    If  | | t = 1 T ( R c , n i [ t ] R c , n i 1 [ t ] ) + t = 1 T 1 ( R o , n i [ t ] R o , n i 1 [ t ] ) | | ε 1 , break
    End If
    update i = i + 1 ;
End For
Output P o , n o p t [ t ] , f n o p t [ t ] , f u o p t [ t ] , q u o p t [ t ] .
The complexity of Algorithm 1 comes from three aspects: (1) the computation of offloading power and CPU frequencies, (2) the computation of the dual variables, and (3) the application of CVX for computing UAV trajectory. Let L 1 and L 2 denote the number of iterations required for the outer loop and the inner loop of Algorithm 1. Let ϕ denote the tolerance error for the subgradient method. Then, we can obtain the total complexity of Algorithm 1 as O [ L 1 ( 2 N T + 1 / ϕ 2 + L 2 T 3 ) ] , where O ( · ) is the big-O notation.
By solving each subproblem alternately, Algorithm 1 can guarantee convergence, while, due to the usage of SCA method and alternating optimization, the global optimum of problem P2 cannot be strictly guaranteed.

4. Robust Design Based on Cutting-Set Method

In this section, we give a cutting-set method to degrade the influence from the uncertainty of the users’ locations. The robust design is achieved by alternating between optimization steps and pessimization steps. In the optimization step, joint resource allocation and trajectory planning are optimized under a given finite subset of worst-case users’ locations by Algorithm 1. Then, in the pessimization step, the subset of worst-case users’ locations is updated according to the UAV trajectory obtained in the optimization step.

4.1. Optimization Step under Finite Subsets of Users’ Location

Note that the worst-case locations of users are changed with the change of UAV trajectory in the optimization process. To simplify the problem, we assume that the worst-case locations of users are included in a finite subset of potential locations. Let S n denote the potential worst-case locations of the nth user. Then, we can express the finite subset of the nth user in the kth optimization as S n k S n . For a given finite subset, we can transform the original problem to
P 5 : max Θ min n N max q n S n k E g a i n , n s . t . C 1 C 6 ,
while the problem P 5 can be solved by Algorithm 1.

4.2. Pessimization Step under Given UAV Trajectory

For a given UAV trajectory obtained from the optimization step, the worst-case users’ location is updated in this step. Considering that the distances d n [ t ] between the UAV and users are larger than the estimation error Δ q n , in the optimization process, we discretize the potential locations of the nth user into equal spacing grids-based worst-case locations with the resolution of π .
For the UAV, the worst-case locations under different trajectories is also different. Thus, the worst-case users’ location needs to be updated after each trajectory planning, while, for the users, the location with the least energy harvest and the most transmission energy consumption corresponds to the worst-case location. Thus, the worst-case location q n w , k of nth user after kth optimization is obtained as
q u q n w , k = q n q n w , k + ε n .
Then, the obtained worst-case locations q n w , k of the nth user is added into the infinite subset S n k for the next turn of optimization.

4.3. Total Algorithm of Robust Resource Allocation and Trajectory Planning

Based on the cutting-set method, we propose a robust resource allocation and trajectory planning algorithm to solve the uncertainty of users’ location in this subsection. The detailed robust algorithm is shown in Algorithm 2.
As shown in Algorithm 2, the finite subset of potential users’ locations are firstly initialized. Firstly, for a given finite subset of users’ locations, the optimal computation offloading variables P o , n k [ t ] , f n k [ t ] , f u k [ t ] and UAV trajectory q u k [ t ] are obtained by solving P 5 with Algorithm 1. Then, based on the UAV trajectory from the previous step, we can obtain the worst-case users’ location and add it into S n k for the next turn of optimization. The robust algorithm processes alternately until the improvement reaches the stable point or reaches the maximum number k of iterations.
Algorithm 2 Robust Offloading Trajectory and Computation Offloading Algorithm with uncertainty of users’ location
Initialization: Set the iterative number k = 1 .
Input: Initialize finite subset S n k .
repeat
    calculate P o , n k [ t ] , f n k [ t ] , f u k [ t ] and q u k [ t ] by Algorithm 1;
    compute q n w , k for given q u k [ t ] ;
    update finite subset S n k + 1 = { S n k , q n w , k } ;
    update k = k + 1 ;
until reach the stable point or the maximum iterative number k
Output  P o , n k [ t ] , f n k [ t ] , f u k [ t ] , q u k [ t ] .

5. Numerical Results

In this section, simulation results are presented to validate the performance of the proposed robust joint resource allocation and trajectory planning algorithm, and are compared with three benchmark schemes. (1) Non-robust: In this scheme, we ignore the estimation error and optimize the problem under the estimated locations. (2) No-resource-allocation-optimization: In this scheme, we offload all computation tasks to UAV with fixed offloading power P o , n = P o , m a x . (3) No-trajectory-planning: In this scheme, we set the UAV trajectory as a circle around users with a radius 200 m.
According to the parameters adopted in [21,30], we consider a 500 × 500 m 2 post-disaster area which includes five ground users. The location estimation errors of the users are ε n = 20 m. The flight altitude of UAV is H = 50 m, and the maximum flight speed of UAV is set as V m a x = 25 m/s. The detailed environment settings are given in Table 1.
In Figure 2, we present the optimized UAV trajectories of the proposed robust joint resource allocation and trajectory planning algorithm and non-robust scheme under different battery capacity. From Figure 2, we can find that with the increase of battery capacity, the UAV can approach each user to provide services. The reason is that on the premise of completing the computation task, the larger the UAV battery capacity, the closer it can be to the users to provide efficient charging services. Note that under the same battery capacity, the proposed robust algorithm is much closer to users than the non-robust scheme. This is because in order to eliminate the impact of the worst-case location error on the users’ power supply, the UAV should be close to the user greatly affected by the location error.
Figure 3 shows the minimum energy gain of users of the proposed robust algorithm with the other three benchmark schemes with different battery capacity of UAV. According to Figure 3, we can find that the proposed robust algorithm obtains the highest energy gain compared with other schemes. The reason is that the proposed robust algorithm can maximize the minimum energy gain of users by jointly optimizing UAV’s trajectory and offloading process, and decreasing the influence of estimation location errors, while the other three schemes only optimize two of the three variables. We can also observe that with the increase of battery capacity, the energy gain of users increases rapidly, and then slows down gradually. That is, a larger UAV battery capacity can ensure UAV approach to users to provide much more efficient charging services.As the distance between UAV and users decreases, the impact of distance on energy supply decreases gradually, which leads to the slowing down of energy gain. In addition, the energy gain of the no-trajectory-planning scheme is a constant when battery capacity is bigger than 11,000 mAh. The reason is that when the battery capacity can ensure that the UAV flies according to the fixed trajectory, the distance between UAV and user is a constant. Then, the increase of battery capacity will not affect the energy gain of users.
In Figure 4, we compare the minimum energy gain of users of the proposed robust algorithm with the other three benchmark schemes with different estimation errors of users. From Figure 4, we can find that with the increase of the estimation errors, the minimum energy gain is decreased, while the reduction of the proposed robust algorithm is less than the non-robust scheme and the no-trajectory-planning scheme. This is because with the increase of the estimation errors, the worst-case location error will greatly increase the distance between UAV and user. Furthermore, compared with the no-trajectory-planning scheme flying as a circle, the non-robust scheme has less time to approach the user, which also leads to the fastest decline among all the schemes. Therefore, for the environment with location errors, it is necessary to introduce robust design into trajectory optimization.
The distance between UAV and user is affected by horizontal distance and flight altitude. Thus, we present the minimum energy gain of users of the proposed robust algorithm with the other three benchmark schemes with different flight altitude of UAV in Figure 5. It can be seen that with the increase of flight altitude, the decrease of user energy gradually speeds up. The reason is that when the flight altitude is greater than the horizontal distance d n [ t ] , the distance between the UAV and users is mainly affected by the flight altitude, and vice versa. Thus, in order to ensure that users receive more energy, the UAV can appropriately reduce the flight altitude when the estimation error is small.
Figure 6 also compares the minimum energy gain of users of the proposed robust algorithm with the other three benchmark schemes with different WPT transmit power of UAV. We can find that the energy gain achieved by the proposed robust algorithm is the highest among the schemes, while the increase of energy is proportional to the transmission power. That is, the user’s energy gain is only affected by the transmitting power of the UAV when the computation task is processed.

6. Conclusions

In this paper, we proposed a robust UAV-aided wireless-powered MEC system in a post-disaster area, where the UAV provides charging and computing services for ground users to ensure that users have enough power. To maximize the energy acquisition of each user, we jointly optimized the computing offloading and UAV trajectory. Particularly due to the destruction of terrestrial communications, the UAV only has an imperfect location of the users. Considering the strongly coupled connectionbetween optimization variables and the influence of user location estimation error, the robust resource allocation and trajectory planning was carefully addressed. Firstly, we proposed a joint resource allocation and trajectory planning algorithm under known users’ location. Then, the robust cutting-set method was proposed to reduce the impact of worst-case location of users on optimization. Finally, we conducted extensive simulations to verify the effectiveness of the proposed robust algorithm.

Author Contributions

Conceptualization, P.C. and Y.L.; methodology, P.C. and Y.L.; software, P.C. and Y.L.; validation, Y.L. and C.Y.; formal analysis, P.C.; investigation, P.C.; resources, P.C.; data curation, P.C. and C.Y.; writing—original draft preparation, P.C. and C.Y.; writing—review and editing, Y.L. and C.Y.; visualization, C.Y.; supervision, Y.L. and C.Y.; project administration, Y.L.; funding acquisition, Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National National Key R&D Program of China under Grants 2020YFB1807805, 2020YFB1807800; in part by the Guangdong Basic and Applied Basic Research foundation under Grant 2019A151501114.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

Not applicable.

Abbreviations

The following abbreviations are used in this manuscript:
UAVUnmanned aerial vehicle
MECMobile edge computing
WPTWireless power transfer
WITWireless information transfer
RFRadio frequency
SCASuccessive convex approximation

Appendix A

Proof of Theorem 1.
Let λ 0 denotes the dual variable associated with the constraint C2. Then, for each user, we can get the Lagrangian function of P 4 1 as
L ( Θ ) = t = 1 T ( η g n [ t ] P u θ n f n [ t ] 3 ) t = 1 T 1 P o , n [ t ] + λ { t = 1 T f n [ t ] C n + t = 1 T 1 r t r , n [ t ] R n } .
Taking the derivative of the Lagrangian function L w.r.t CPU frequency f [ n ] and offloading power P o , n [ t ] yields
L ( Θ ) P o , n [ t ] = λ B l n 2 g ˜ n [ t ] σ 2 + P o , n [ t ] g ˜ n [ t ] 1 , L ( Θ ) f n [ t ] = 3 θ n f n [ t ] 2 + λ C n .
Let L P o , n [ t ] = 0 and L f n [ t ] = 0 , the optimal P o , n o p t [ t ] and f n o p t [ t ] can be obtained. The proof of Theorem 1 is finished. □

References

  1. Erdelj, M.; Natalizio, E.; Chowdhury, K.R.; Akyildiz, I.F. Help from the Sky: Leveraging UAVs for Disaster Management. IEEE Pervasive Comput. 2017, 16, 24–32. [Google Scholar] [CrossRef]
  2. Yao, Z.; Cheng, W.; Zhang, W.; Zhang, H. Resource Allocation for 5G-UAV-Based Emergency Wireless Communications. IEEE J. Sel. Areas Commun. 2021, 39, 3395–3410. [Google Scholar] [CrossRef]
  3. Chen, W.; Su, Z.; Xu, Q.; Luan, T.H.; Li, R. VFC-Based Cooperative UAV Computation Task Offloading for Post-disaster Rescue. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 228–236. [Google Scholar]
  4. Zhang, S.; Liu, J. Analysis and Optimization of Multiple Unmanned Aerial Vehicle-Assisted Communications in Post-Disaster Areas. IEEE Trans. Veh. Technol. 2018, 67, 12049–12060. [Google Scholar] [CrossRef]
  5. Gao, M.; Zhang, B.; Wang, L. A Dynamic Priority Packet Scheduling Scheme for Post-disaster UAV-assisted Mobile Ad Hoc network. In Proceedings of the 2021 IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021; pp. 1–6. [Google Scholar] [CrossRef]
  6. Saif, A.; Dimyati, K.; Noordin, K.A.; Shah, N.S.M.; Abdullah, Q.; Mukhlif, F. Unmanned Aerial Vehicles for Post-Disaster Communication Networks. In Proceedings of the 2020 IEEE 10th International Conference on System Engineering and Technology (ICSET), Shah Alam, Malaysia, 9 November 2020; pp. 273–277. [Google Scholar] [CrossRef]
  7. Tang, H.; Wu, Q.; Xu, J.; Chen, W.; Li, B. A Novel Alternative Optimization Method for Joint Power and Trajectory Design in UAV-Enabled Wireless Network. IEEE Trans. Veh. Technol. 2019, 68, 11358–11362. [Google Scholar] [CrossRef]
  8. Ouyang, T.; Zhou, Z.; Chen, X. Follow Me at the Edge: Mobility-Aware Dynamic Service Placement for Mobile Edge Computing. IEEE J. Sel. Areas Commun. 2018, 36, 2333–2345. [Google Scholar] [CrossRef] [Green Version]
  9. Cao, P.; Liu, Y.; Yang, C.; Xie, S.; Xie, K. MEC-Driven UAV-Enabled Routine Inspection Scheme in Wind Farm Under Wind Influence. IEEE Access 2019, 7, 179252–179265. [Google Scholar] [CrossRef]
  10. Yang, C.; Lou, W.; Liu, Y.; Xie, S. Resource Allocation for Edge Computing-Based Vehicle Platoon on Freeway: A Contract-Optimization Approach. IEEE Trans. Veh. Technol. 2020, 69, 15988–16000. [Google Scholar] [CrossRef]
  11. Wu, Z.; Yang, Z.; Yang, C.; Lin, J.; Liu, Y.; Chen, X. Joint deployment and trajectory optimization in UAV-assisted vehicular edge computing networks. J. Commun. Netw. 2021, 1–12. [Google Scholar] [CrossRef]
  12. Li, P.; Xu, J. Fundamental Rate Limits of UAV-Enabled Multiple Access Channel With Trajectory Optimization. IEEE Trans. Wirel. Commun. 2020, 19, 458–474. [Google Scholar] [CrossRef] [Green Version]
  13. Xie, L.; Xu, J.; Zhang, R. Throughput Maximization for UAV-Enabled Wireless Powered Communication Networks. IEEE Internet Things J. 2019, 6, 1690–1703. [Google Scholar] [CrossRef] [Green Version]
  14. Liu, Y.; Yang, C.; Jiang, L.; Xie, S.; Zhang, Y. Intelligent Edge Computing for IoT-Based Energy Management in Smart Cities. IEEE Netw. 2019, 33, 111–117. [Google Scholar] [CrossRef]
  15. Lv, B.; Yang, C.; Chen, X.; Yao, Z.; Yang, J. Task Offloading and Serving Handover of Vehicular Edge Computing Networks Based on Trajectory Prediction. IEEE Access 2021, 9, 130793–130804. [Google Scholar] [CrossRef]
  16. Zhang, X.; Zhong, Y.; Liu, P.; Zhou, F.; Wang, Y. Resource Allocation for a UAV-Enabled Mobile-Edge Computing System: Computation Efficiency Maximization. IEEE Access 2019, 7, 113345–113354. [Google Scholar] [CrossRef]
  17. Liu, Y.; Xie, S.; Zhang, Y. Cooperative Offloading and Resource Management for UAV-Enabled Mobile Edge Computing in Power IoT System. IEEE Trans. Veh. Technol. 2020, 69, 12229–12239. [Google Scholar] [CrossRef]
  18. Zhou, F.; Wu, Y.; Hu, R.Q.; Qian, Y. Computation Rate Maximization in UAV-Enabled Wireless Powered Mobile-Edge Computing Systems. IEEE J. Sel. Areas Commun. 2018, 36, 1927–1941. [Google Scholar] [CrossRef] [Green Version]
  19. Liu, Y.; Xie, S.; Yang, Q.; Zhang, Y. Joint Computation Offloading and Demand Response Management in Mobile Edge Network With Renewable Energy Sources. IEEE Trans. Veh. Technol. 2020, 69, 15720–15730. [Google Scholar] [CrossRef]
  20. Liu, Y.; Xiong, K.; Ni, Q.; Fan, P.; Letaief, K.B. UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization. IEEE Internet Things J. 2020, 7, 2777–2790. [Google Scholar] [CrossRef]
  21. Liu, Y.; Qiu, M.; Hu, J.; Yu, H. Incentive UAV-Enabled Mobile Edge Computing Based on Microwave Power Transmission. IEEE Access 2020, 8, 28584–28593. [Google Scholar] [CrossRef]
  22. Xie, L.; Xu, J.; Zeng, Y. Common Throughput Maximization for UAV-Enabled Interference Channel With Wireless Powered Communications. IEEE Trans. Commun. 2020, 68, 3197–3212. [Google Scholar] [CrossRef] [Green Version]
  23. Zhang, S.; Zhang, H.; Di, B.; Song, L. Cellular UAV-to-X Communications: Design and Optimization for Multi-UAV Networks. IEEE Trans. Wirel. Commun. 2019, 18, 1346–1359. [Google Scholar] [CrossRef] [Green Version]
  24. Zhong, W.; Xie, K.; Liu, Y.; Yang, C.; Xie, S.; Zhang, Y. Multi-Resource Allocation of Shared Energy Storage: A Distributed Combinatorial Auction Approach. IEEE Trans. Smart Grid 2020, 11, 4105–4115. [Google Scholar] [CrossRef]
  25. Zhong, W.; Xie, K.; Liu, Y.; Xie, S.; Xie, L. Chance Constrained Scheduling and Pricing for Multi-Service Battery Energy Storage. IEEE Trans. Smart Grid 2021, 12, 5030–5042. [Google Scholar] [CrossRef]
  26. Zhong, W.; Xie, S.; Xie, K.; Yang, Q.; Xie, L. Cooperative P2P Energy Trading in Active Distribution Networks: An MILP-Based Nash Bargaining Solution. IEEE Trans. Smart Grid 2021, 12, 1264–1276. [Google Scholar] [CrossRef]
  27. Gao, Y.; Tang, H.; Li, B.; Yuan, X. Robust Trajectory and Power Control for Cognitive UAV Secrecy Communication. IEEE Access 2020, 8, 49338–49352. [Google Scholar] [CrossRef]
  28. Cui, M.; Zhang, G.; Wu, Q.; Ng, D.W.K. Robust Trajectory and Transmit Power Design for Secure UAV Communications. IEEE Trans. Veh. Technol. 2018, 67, 9042–9046. [Google Scholar] [CrossRef] [Green Version]
  29. Zhou, Y.; Zhou, F.; Zhou, H.; Ng, D.W.K.; Hu, R.Q. Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks. IEEE Trans. Commun. 2020, 68, 4022–4034. [Google Scholar] [CrossRef]
  30. Yang, T.; Taghizadeh, O.; Hu, Y.; Xu, H.; Caire, G. Robust Secure UAV Communication Systems with Full-Duplex Jamming. In Proceedings of the 2021 IEEE Wireless Communications and Networking Conference (WCNC), Nanjing, China, 29 March–1 April 2021; pp. 1–6. [Google Scholar] [CrossRef]
Figure 1. The UAV-enabled wireless-powered MEC system in post-disaster area.
Figure 1. The UAV-enabled wireless-powered MEC system in post-disaster area.
Applsci 12 02226 g001
Figure 2. The optimized UAV trajectories under different schemes and battery capacity.
Figure 2. The optimized UAV trajectories under different schemes and battery capacity.
Applsci 12 02226 g002
Figure 3. Energy gain of users under different schemes and battery capacity of UAV.
Figure 3. Energy gain of users under different schemes and battery capacity of UAV.
Applsci 12 02226 g003
Figure 4. Energy gain of users under different schemes and estimation errors of users.
Figure 4. Energy gain of users under different schemes and estimation errors of users.
Applsci 12 02226 g004
Figure 5. Energy gain of users under different schemes and flight altitude of UAV.
Figure 5. Energy gain of users under different schemes and flight altitude of UAV.
Applsci 12 02226 g005
Figure 6. Energy gain of users under different schemes and WPT transmit power of UAV.
Figure 6. Energy gain of users under different schemes and WPT transmit power of UAV.
Applsci 12 02226 g006
Table 1. Simulation parameters.
Table 1. Simulation parameters.
B5 MHzThe channel bandwidth.
β 0 −50 dBThe channel power gain at distance d 0 = 1 m.
σ 2 10 9 WThe receiver noise power.
P o , n m a x 0.5 WThe maximum WIT transmit power of user.
P u 50 WThe WPT transmit power of UAV.
η 0.15The energy conversion efficiency of user.
C n , C u 10 3 cycles/bitThe number of CPU cycles.
θ n , θ u 10 28 The effective switched capacitance.
f n , m a x , f u , m a x 10 GHzThe maximum frequency of CPU.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cao, P.; Liu, Y.; Yang, C. Robust Resource Allocation and Trajectory Planning of UAV-Aided Mobile Edge Computing in Post-Disaster Areas. Appl. Sci. 2022, 12, 2226. https://doi.org/10.3390/app12042226

AMA Style

Cao P, Liu Y, Yang C. Robust Resource Allocation and Trajectory Planning of UAV-Aided Mobile Edge Computing in Post-Disaster Areas. Applied Sciences. 2022; 12(4):2226. https://doi.org/10.3390/app12042226

Chicago/Turabian Style

Cao, Peng, Yi Liu, and Chao Yang. 2022. "Robust Resource Allocation and Trajectory Planning of UAV-Aided Mobile Edge Computing in Post-Disaster Areas" Applied Sciences 12, no. 4: 2226. https://doi.org/10.3390/app12042226

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop